
Encryption 2
Computers
8th - 10th Grade
CCSS covered
Used 233+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An encryption key is used to help decrypt messages
Tags
CCSS.RI.9-10.4
CCSS.RI.9-10.4
CCSS.RI.11-12.4
CCSS.RI.7.4
CCSS.RI.8.4
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Taking a secret message and reproducing the original plain text is known as?
Tags
CCSS.RI.9-10.4
CCSS.RI.9-10.4
CCSS.RI.11-12.4
CCSS.RI.7.4
CCSS.RI.8.4
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the algorithm of ceasar's cipher?
Each letter is replaced with a particular symbol
Each letter is replaced with a letter a certain number of steps down the alphabet
Each letter is replaced with a particular number from 0 to 26, and numbers are replaced with letters.
Each letter is replaced with a completely random number
Tags
CCSS.L.1.5A
CCSS.L.1.5B
CCSS.L.K.5A
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is symmetric encryption?
When users use the same key to encrypt communication.
When users use the same line of communication.
When users use the same operating systems.
When users use the same font in messages
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of key is not shared and computers cannot decrypt a message without it?
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of key can be freely shared with anyone so that they can encrypt a message?
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The process of converting plaintext to ciphertext.
cryptography
cyphertext
decryption
encryption
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?